Enabling applicationcentric
|
|
- Lorin Alexina Patrick
- 8 years ago
- Views:
Transcription
1 Enabling applicationcentric mobile networks
2 Contents Introduction... 3 Technical background: What is DPI?... 4 Bandwidth Management a DPI application... 6 The potential impact of DPI applications on society... 8 Levels of bandwidth management About ipoque
3 Introduction The Opportunity Demand for embedded application-aware network solutions is coming primarily from mobile operators as new applications and services are hitting the network daily with widely varying traffic patterns and bandwidth needs. Revenue is lagging, traffic is growing, and users are increasingly demanding a consistently high quality of service regardless of where they are or what device they are using. Video as a percentage of total network traffic continues to rise, and the exponential growth in data traffic isn t about to slow anytime soon; operators can t afford to match this growth with spending on new transport. These problems can be addressed by implementing application awareness or recognition, which enables the mobile network to understand the characteristics and the behavior of the applications running over it. With application recognition, mobile operators can not only better manage and monitor the traffic flowing on their networks using techniques such as video optimization and caching, it also allows better monetization of that traffic by supporting new service and pricing models. Enabling Application Recognition Enabling accurate application identification requires technology with the intelligence to do more than just a high level view of the data packets traversing the network. Deep packet inspection (DPI) provides that visibility by analyzing up to Layer 7 of the packet, providing finer control and more granular application identification than when classification is based only on header information. This requires maintaining a software library of protocols and applications and understanding patterns and behaviors for every new app and version, otherwise a packet can easily be incorrectly classified. DPI can also extract metadata and application attributes from the network traffic to determine application performance and quality of service for VoIP and video, as well as to protect against network security threats. Rohde & Schwarz Enabling application-centric mobile networks 3
4 Benefits of application recognition in mobile networks Deep Packet Inspection summary: a key technology to manage mobile networks Control Policy & QoS User / traffic control Caching & redirection Differentiate Service / content based charging Application control Monitor Network usage Service usage User behavior QoS assurance Secure worm / spam / botnet detection Intrusion detection Parental control Once application classification data is extracted, it can be used for a wide range of use cases, including the following: Policy Control and Charging Mobile data usage is soaring across a diverse range of applications and dynamic control over Quality of Service (QoS) and charging is helping mobile operators to monetize their LTE investments. It could be the up-and-coming mobile network operator that wants to set itself apart from the well-established competition with progressive and creative charging models and services or the global player that wants to monetize OTT traffic and use network capacity as efficiently as possible to deliver the best quality of experience to its customers. Network operations and engineering teams can manage bandwidth and QoS with policy control but there is a growing need for the commercial, product management and customer service and billing teams to innovate with new services and charging models. Subscriber behavior details based on actual protocol and application usage can be collected in order to be able to report on and monitor usage and bill by application or bandwidth used. Granular control of service quality and a deep understanding of exactly what applications are being used and how is critical for operators to establish new business models and satisfy customers. Mobile operators such as Aircel in India are getting creative by offering free access to Facebook data packages to attract loyalty of young customers in a fiercely competitive mobile market. Another approach could be to enable partners to sponsor a specific QoS or bandwidth for the dedicated download 4
5 of content. This can also be tied into a payment channel used for the purchase of the content. One example would be that if a customer buys a video at a content portal, the better QoS for viewing the video is sponsored by the content owner. Or if the customer pays with the mobile operator s account, higher bandwidth is automatically included in the purchase. Revenue-generating benefits Tap the revenue potential of OTT video usage and monetize this activity with flexible pricing models, including zero-rated plans. Policy-based traffic management optimizes the streaming video experience for paying subscribers. Enable personalized subscriber plans based on application categories, individual applications, or even specific content or websites. Deliver multi-device or family service plans that aggregate bandwidth quotas across multiple devices and/or users. Detect and block unauthorized device tethering in the mobile network, while monetizing and managing authorized tethering plans. Apply user-aware policies to allocate bandwidth intelligently e.g. deliver a higher level of service to power users or enterprise users. Detect VoIP and video traffic and offer QoS metrics to VoIP and video providers to offer premium services or guaranteed QoS. DPI-enabled troubleshooting solutions allow operators to pinpoint subscribers experiencing poor service quality and precisely identify the network failure root cause, linked to radio coverage, network capacity, handovers, subscriber rights and/or handset settings. Real-time monitoring and troubleshooting solutions empower network supervision teams with real-time fault detection to trigger alarms based on customer-centric quality indicators and on KPI trend analysis. This in turn can be used to improve the operator s end-to-end business performance including the network, service quality and subscriber satisfaction. Cost Saving benefits Effectively manage mobile network congestion at peak times and locations by prioritizing network traffic based on volume and QoS for each application. Efficient CapEx spending based on analysis of site performance, and network traffic congestion. Improving network performance improves customer satisfaction and loyalty, which can reduce subscriber acquisition and retention costs, which can be over 60% of a mobile operator s OpEx budget. Performance Monitoring and Troubleshooting Network operations teams use DPI to determine the cause of service or network quality degradation or bandwidth congestion since DPI can identify specific applications and key performance indicators (KPIs) causing congestion, such as HD video streaming. It is also possible to drill down to a particular subscriber or base station. According to Ericsson s 2013 ConsumerLab study of smart phone users, network performance (19%) was determined to be the main driver of loyalty to mobile operators, followed by value for money (16%). Addressing network performance has twice the impact on customer loyalty compared to measures such as improving customer support. This can have a real impact on costs since subscriber acquisition and retention costs form the single largest OPEX element for most mobile operators. Rohde & Schwarz Enabling application-centric mobile networks 5
6 Analytics Gaining business intelligence from network and subscriber data is a fast growing area as mobile operators recognize they can unlock value by better understanding usage and behavior. This in turn is being used by marketing and product managers to enhance data packages as well as by network planning and optimization departments to plan investment and improve QoE per application. How key groups within mobile operator are effectively using analytics data: Operations & Engineering: optimize mobile network and forecast capacity according to traffic evolution KPI Monitoring/Auditing team: responsible for key performance indicator (KPI) monitoring and use analytics to deliver customize reports based on KPIs for different teams Customer Service: investigate customer complaints, ensure customer satisfaction and identify subscribers at risk of churning Marketing & Commercial: segment subscriber base according to their usage & ARPU Cost saving and Revenue-generating Benefits Achieve granular insight into mobile network usage for better business planning. View and analyze network activity down to application, device, location, and subscriber. Monitor high-value customer QoE and SLAs. Predict customer churn using key quality indicators linked with length of contract duration and launch marketing retention campaigns. Ensure successful marketing campaigns by adapting tariff plans based on subscriber usage, most relevant devices, services and apps per plan. Traffic Steering (QoS and QoE) The integration of DPI allows prompt identification of applications associated with every network flow including carrier services such as VoIP and video, file transfer within complex apps and Over The Top (OTT) services such as You Tube, Netflix, Hulu, Skype, Viber, WhatsApp, Tango, Facebook, Twitter, and LinkedIn. This in turn enables application-aware and subscriber-aware traffic steering. To mitigate problems with congested LTE networks, network engineering and operations teams must be smarter about their traffic management so that they can provide a greater, more consistent quality of service for their subscribers. Network engineering teams are seeking ways to balance data traffic between mobile networks and Wi-Fi access in a way that s transparent to users and reduces mobile network congestion. The key to success is not simply offloading traffic from the cellular network onto Wi-Fi, but to steer traffic in a managed way between the two technologies to always deliver the best customer experience. Cost saving and Revenue-generating Benefits Manage network usage more effectively to maintain QoS under varying traffic loads. Track usage patterns in detail, identifying subscribers, devices, locations, and times associated with high bandwidth consumption. Then can apply volumebased shaping to manage traffic peaks and optimize bandwidth availability. Redirect service-related traffic in a selective, intelligent way to better manage bandwidth and application performance. Mobile Video optimization This involves better management of video content, including identifying video traffic and routing certain services through content delivery networks as a way to reduce network loads, or doing media caching in which frequently accessed applications and content are stored closer to the subscriber. Network engineering and operations, as well as commercial teams, are all looking for ways to optimize video and manage OTT content such as YouTube and Facebook traffic. Application-aware video optimization systems can include video analytics solutions that can ensure a good viewing experience by preventing stalls and buffering delays. Revenue-generating and Cost-saving benefits Allows operators to optimize video content to control the delivery and enhance quality of service (QoS) and quality of experience (QoE). Reduce bandwidth consumption by 30-50% on expensive RAN and backhaul capacity, and thereby avoid or delay network expansion and capex outlay. Lower operational expenses by reducing wasted bandwidth while providing the same perceived quality of experience. Ensure a consistently great video experience by preventing stalls and buffering delays that affect customer satisfaction and loyalty. Create new revenue opportunities through mobile data service packages designed especially for high-volume video consumers. Gain insight on consumer behavior through detailed information of video usage. 6
7 WiFi Off-load Network operations teams have previously focused on traffic and congestion management to deal with new datacentric and mobile video applications, but mobile data offload has the potential to solve the problem of lower priority (low revenue) traffic clogging up the network. If used strategically it can lead to a better delivery of quality services to the user. Mobile data offload solutions typically treat all traffic flows equally without distinguishing the application involved or the device used. However, in LTE deployments, carriers will need to selectively steer traffic flows based on the application used e.g. in order to ensure QoS on latency-sensitive VoIP and video services. In order to implement differentiated flow steering, mobile data offload solution vendors need a reliable application detection technology relying on DPI. Mobile Internet offload, if done correctly, can enable new and better enduser services, such as better indoor coverage with femtocells, enhanced performance for rich media services over WiFi, or the ability to support larger monthly data quotas at lower prices using offload gateways. Operators still would like to maintain some control on what applications they would want to use the WiFi networks for (e.g., Apple FaceTime) and which ones should use the cellular networks (e.g., voice). In the case of video, some mobile network operators manage video as an application, creating policy that moves (non-premium) video to WiFi. Many operators with a premium video service will often make an attempt to keep premium content on cellular to guarantee service while using existing subscriber management and billing systems. In addition, operators would like this decision to be dynamic, based on network load conditions, location of the consumer, time of day, etc. The policy based control mechanism is on a per device basis that is application aware. The control criteria can be based on numerous parameters, such as applications, billing plans, traffic priority, device types, device locations, network types, different home or roaming policies, and real-time network traffic conditions. Mobile Network Security Security is a growing concern among network operations and engineering teams given the vast number of devices, apps and content on the network. DPI can enable a wide variety of malware detection techniques, content security, parental controls, anti-virus and intrusion detection/ prevention. Rogue applications can prove problematic as they can create vulnerabilities within the network or pose as malware exploiting vulnerabilities in the guise of a legitimate application. Software applications particularly video are generating significant increases in mobile network traffic. They are also becoming the preferred vehicle for delivering malware to subscribers, either by exploiting unpatched vulnerabilities in the application itself or being carried into the network through applications downloaded from the Web. Infrastructure vendors are also working to correct the security vulnerabilities in their own RAN, switching, router, and transmission equipment, as well as introduce new security features, based on DPI, into their portfolios. Protection and Revenue-generating Benefits Detect and mitigate network threats quickly, before they impact QoS. Monitor network traffic in a granular way to pinpoint potential malware, viruses and other threats. It alerts threat mitigation systems proactively and blocks suspect traffic, quarantining devices or subscribers exhibiting prohibited behavior. Enable new services for subscribers including parental controls, device monitoring and management and loss and theft protection. Combine a mobile security app, which prevents malicious apps from being installed, with networkbased malware detection and subscriber alerts to offer complete protection to subscribers. Generate new and recurring revenues by offering value-added, mobile security services to subscribers for a monthly fee or bundled to up-sell other services. Cost-saving Benefits WiFi and small cells can reduce by up to two-thirds the per-bit cost of carrying mobile traffic, compared to macro cellular networks. Offload data traffic in high usage areas, reducing the need for additional capacity in cellular networks. Rohde & Schwarz Enabling application-centric mobile networks 7
8 Decision Time: Make or Buy DPI As mobile operators increasingly seek to improve the user experience by making their networks application-aware and adaptive, there is a corresponding opportunity for equipment and solution suppliers to provide offerings that enable them; this, in turn, is driving demand for embedded DPI. Even after establishing the need for adding application recognition using a DPI solution, vendors face a key make or buy decision: develop DPI in-house vs. integrating third party DPI. A key factor in the decision is the cost of using internal engineering costs compared to sourcing DPI software licenses. The latter is becoming popular as vendors increasingly choose to focus on enhancing their core technology and relying on best of breed partners to add feature benefits, thereby speeding up time to market. A key consideration with DPI is that developing the software is one thing but it s the ongoing updates required to ensure accuracy and latest detection of new apps and versions of apps as well as encrypted apps that add up in terms of maintenance and resource costs and complexity. Licensing fees are a small fraction of necessary R&D and include signature plug-ins and maintenance. Top 10 Checklist for Sourcing DPI: High Detection Rate Performance and Efficiency Accuracy Identifying Encrypted Apps Ease of integration Metadata Extraction Frequency of updates Global application visibility Flexibility In-house engineers and developers 1. High Detection Rate This involves supporting a wide range of protocols and applications to ensure that as much of the network traffic as possible is detected. Reliable DPI software should be able to detect over 95% of traffic in mobile networks. This is achieved through maintaining a software library of the latest and newest applications and protocols along with frequent updates of versions and new apps to ensure ongoing reliable detection. Before selecting a partner, inhouse engineers will typically carry out performance tests based on real traffic data to determine application detection rates. 2. Performance and Efficiency DPI software is made to inspect packets at high wire speeds and a critical factor is the throughput and resources required. Keeping the amount of resources that integrated DPI and application classification technology requires low is critical. The fewer cores (on a multi-core processor) and the less on-board memory an engine needs, the better. Multi-threading provides almost linear scalability on multi-core systems. In addition, highly-optimized flow tracking is required for handling millions of concurrent mobile subscribers. 3. Accuracy It is critical for certain use cases such as policy control and charging that applications are not identified incorrectly, known as false positives. In addition, traffic management and policy control requires a very low false negative rate i.e. low classification rate of applications. Advanced DPI techniques can reliably detect network protocols, even if they use advanced obfuscation and encryption techniques. Applications can also be grouped into service types e.g. video, P2P, VoIP, IM, making it easier to analyze and enable intelligent traffic decisions rather than individual protocols. 4. Identifying Encrypted Apps It has become harder to identify applications with as many as one in four protocols and applications now being encrypted e.g. Skype, WhatsApp, BitTorrent, Facebook, Twitter, Dropbox, Gmail, Office365, Instagram etc. In addition, some protocols e.g. Skype and other P2P apps, can adapt to circumvent firewalls and DPI detection when for example traffic for a specific protocol is limited or blocked. Advanced DPI uses a variety of detection techniques including finite state machine, byte pattern matching and behavioral analysis to accurately identify applications. 5. Ease of integration This is a key selection criteria since DPI software needs to be integrated into a vendor s existing hardware or software environment, e.g. does the software run in any Unix (e.g. 8
9 Linux, BSD, Mac OS, Solaris etc.) and Windows environment, and include both C and Java APIs. In addition, it s important that thorough documentation is provided including fully documented APIs and code samples. Typically, DPI software is sold as an SDK, with integration requiring just a couple of API calls. In addition, some providers offer network traffic test tools, which double-checks the validity of an integration and provides a deeper understanding for use cases. 6. Metadata Extraction DPI software offers the option to extract metadata on applications for performance KPIs e.g. voice and video over LTE or details on application attributes for network security reasons. This can include: Subtype detection of application clients such as audio, video, or file transfer User based metadata extraction e.g. sender/ receiver, callee, caller etc. Application QoS/QoE including VoLTE KPIs e.g. call origin, call time, bit rate, jitter, etc. needs, by offering the flexibility to add unique applications to the existing signature database. This also means protocol and application detection can be customized within days as new business demands arise. 10. In-house engineers and developers Last but not least, it is worth double-checking that the DPI software company you are considering actually develops their own software in-house rather than sub-contracting it to another software house. This ensures high level of quality assurance and a tighter connection between the developers and product management and sales and support teams. This also means that your technical engineering staff can speak directly to engineers and developers who work on the DPI software, this is real nice-to-have for technical teams who work on integrating DPI software into their solutions. 7. Frequency of updates The evolution of network traffic means that protocols and signatures are constantly changing, and an application identification system must keep up. Good DPI is achieved by having a team of experts who study application protocols and analyze their patterns and behaviors. Signature updates should be issued on a frequent basis to ensure a high level of accurate application identification. Even small changes to protocols and applications can lead to problems with classification and since details for most application changes are not publicly announced, this requires constant attention. As a result of ongoing performance and reliability testing, regular improvements can be made to the software to ensure all applications are detected. 8. Global application visibility A key factor in choosing to source DPI is that the software is often deployed globally and regularly enhanced with the newest applications based on continuous feedback from multiple customers and regions. This results in a much better detection rate than in-house DPI. This is especially important considering the level of performance, accuracy and reliability that a mobile network supporting millions of subscribers would require. 9. Flexibility Network infrastructure vendors as well as mobile operators want to ensure they choose a DPI partner that offers flexibility in terms of adding new application or protocols but also in terms of being able to gain direct access to engineers, influence roadmap for new features etc. This flexibility can also include being able to add custom-defined protocols to extend the detection. This allows customers to adapt the solution to individual use cases and reporting Rohde & Schwarz Enabling application-centric mobile networks 9
10 About ipoque s OEM DPI ipoque, a Rohde&Schwarz company, provides applicationaware traffic management and analysis solutions, using DPI technology, to help operators and equipment vendors to better understand traffic patterns, monetize new data services and improve the quality of experience for their subscribers. ipoque delivers accurate and reliable DPI software through our OEM solutions, enabling consistent application recognition for bandwidth and congestion control, prioritized quality of service delivery and detailed network visibility. Network equipment providers use ipoque s deep packet inspection technology in their network security, optimization and network management products to analyze the data traffic of hundreds of millions of Internet users. R&S PACE (Protocol and Application Classification Engine) software has been optimized for fast performance, efficient memory usage and classification reliability. Applications to Layer 7 (e.g. Skype, Facebook, YouTube, etc.) are accurately identified as well as detection of audio, video and key performance indicators for deeper insight. ipoque supports thousands of network protocols and applications and frequent signature updates ensure ongoing reliable detection. Based on performance tests on real traffic data, ipoque can accurately identify over 95% of network traffic. Keeping the amount of resources that integrated DPI and application classification technology requires low is critical. The fewer cores (on a multi-core processor) and the less onboard memory an engine requires, the better. ipoque has the industry s most efficient memory footprint, which combined with high performance helps contain costs for network equipment vendors and their customer. 10
11 Rohde & Schwarz Enabling application-centric mobile networks 11
12 About ipoque ipoque GmbH, a Rohde & Schwarz company, is a leading supplier of network traffic analytics and IP classification solutions to network operators and infrastructure vendors. Over 200 customers in more than 60 countries across the globe rely on ipoque to maximize network efficiency, improve the quality of experience for their subscribers and develop the intelligent communications networks of the future. About Rohde & Schwarz The Rohde & Schwarz electronics group is a leading supplier of solutions in the fields of test and measurement, broadcast and media, secure communications, cybersecurity, and radiomonitor ing and radiolocation. Founded more than 80 years ago, this independent global company has an extensive sales network and is present in more than 70 countries. The company is headquartered in Munich, Germany. Certified Quality Management ISO 9001 ipoque GmbH Rohde & Schwarz GmbH & Co. KG R&S is a registered trademark of Rohde & Schwarz GmbH & Co. KG Trade names are trademarks of the owners PD Version June 2015 Enabling application-centric mobile networks Data without tolerance limits is not binding Subject to change 2015 Rohde & Schwarz GmbH & Co. KG Munich, Germany 2015 ipoque GmbH Leipzig, Germany PDP 1 en
Intelligent Policy Enforcement Solutions for Mobile Service Providers
Intelligent Policy Enforcement Solutions for Mobile Service Providers To do more with your wireless network you need to see more. Imagine being able to view network activity down to the granular level,
More informationIntelligent Policy Enforcement Solutions for Broadband Service Providers
Intelligent Policy Enforcement Solutions for Broadband Service Providers To do more with your broadband network you need to see more. Imagine being able to view network activity down to the granular level,
More informationSECURITY & REAL-TIME APPLICATION INSIGHT
SECURITY & REAL-TIME APPLICATION INSIGHT OCTOBER 2014 AGENDA Knowing what s on your Network Benefits of Application Recognition Deeper Insight and Content Decoding Security Customer Use Case NETWORK SECURITY
More informationIntelligent Policy Enforcement Solutions for Cloud Service Providers
Intelligent Policy Enforcement Solutions for Cloud Service Providers To do more with your application delivery network you need to see more. Imagine being able to view network activity down to the granular
More informationHow To Use Icem
DataSheet icem: A complete view of the customer To overcome the challenges of decreasing margins from voice services, whilst catering for high cost network investments due to high data consumption, operators
More informationQuality of Experience for Mobile Data Networks citrix.com
Quality of Experience for Mobile Data Networks White Paper Quality of Experience for Mobile Data Networks citrix.com i Quality of Experience for Mobile Data Networks Superior Quality of Experience with
More informationGetting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping
Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Executive Summary As organizations
More informationVoice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper
> A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information
More informationR&S SITGate Next-Generation Firewall Secure access to Internet and cloud services
Secure Communications Product Brochure 02.00 R&S SITGate Next-Generation Firewall Secure access to Internet and cloud services R&S SITGate Next-Generation Firewall At a glance The R&S SITGate is a multifunctional,
More informationApp coverage. ericsson White paper Uen 284 23-3212 Rev B August 2015
ericsson White paper Uen 284 23-3212 Rev B August 2015 App coverage effectively relating network performance to user experience Mobile broadband networks, smart devices and apps bring significant benefits
More informationIntelligent Policy Enforcement Solutions for Higher Education Institutions
Intelligent Policy Enforcement Solutions for Higher Education Institutions To do more with your campus network you need to see more. Imagine being able to view network activity down to the granular level,
More informationDATA-DRIVEN EFFICIENCY
DATA-DRIVEN EFFICIENCY Combining actionable information with market insights to work intelligently and reduce costs ACTIONABLE INTELLIGENCE Ericsson is driving the development of actionable intelligence
More informationDataSheet. A complete view of the customer. What is Accanto s icem?
DataSheet icem: A complete view of the customer To overcome the challenges of decreasing margins from voice services, whilst catering for high cost network investments due to high data consumption, Operators
More informationAPPLICATION-AWARE ROUTING IN SOFTWARE-DEFINED NETWORKS
APPLICATION-AWARE ROUTING IN SOFTWARE-DEFINED NETWORKS SARO VELRAJAN Director of Technology, Aricent APPLICATION-AWARE ROUTING IN SOFTWARE-DEFINED NETWORKS Service providers are constantly exploring avenues
More informationMobile Voice Off-Load
Mobile Voice Off-Load An AdvOSS Solution White Paper Latest version of this white paper can always be found at: http://advoss.com/resources/whitepapers/mobile-voice-offload.pdf For more information, contact
More informationResearch Report Charging and Billing for the Digital Economy
Research Report Charging and Billing for the Digital Economy Copyright Openet Telecom, 2013 Index Introduction 3 1. The Future for Traditional Billing and Charging 4 2. Innovating and Accelerating Time
More informationOpen Source in Government: Delivering Network Security, Flexibility and Interoperability
W H I T E P A P E R Open Source in Government: Delivering Network Security, Flexibility and Interoperability Uncompromising performance. Unmatched flexibility. Introduction Amid a growing emphasis on transparency
More informationWhy Is DPI Essential for Wireless Networks?
White Paper Why Is DPI Essential for Wireless Networks? By: Manish Singh, CTO Overview The biggest challenge network operators continue to face is how to keep up with seemingly insatiable demand for mobile
More informationIntelligent Policy Enforcement for LTE Networks
The New Digital Lifestyle and LTE Intelligent Policy Enforcement for LTE Networks Mobile data networks are an essential tool in our hyperconnected society for streaming video, social networking, and collaboration.
More informationWAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO
WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO The number of branch-office work sites is increasing, so network administrators need tools to
More informationApplication Performance Management
Application Performance Management Intelligence for an Optimized WAN xo.com Application Performance Management Intelligence for an Optimized WAN Contents Abstract 3 Introduction 3 Business Drivers for
More informationIs backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure
Is backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure The LTE backhaul challenge Communication Service Providers (CSPs) are adopting LTE in rapid succession.
More informationThe Broadband Service Optimization Handbook Chapter 3
Gaining detailed information about the traffic on your network and the behavior of your subscribers is crucial to achieving success in the highly competitive service provider market. The latest breed of
More information1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic
1110 Cool Things Your Firewall Should Do Extending beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
More informationProviding Secure IT Management & Partnering Solution for Bendigo South East College
Providing Secure IT Management & Partnering Solution for Bendigo South East College Why did Bendigo South East College engage alltasksit & DELL? BSEC is in the midst of school population growth in 2015,
More informationNokia Siemens Networks Network management to service management - A paradigm shift for Communications Service Providers
White paper Nokia Siemens Networks Network management to service management - A paradigm shift for Communications Service Providers Service management solutions enable service providers to manage service
More informationCorporate Network Services of Tomorrow Business-Aware VPNs
Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution
More informationElevating Data Center Performance Management
Elevating Data Center Performance Management Data Center innovation reduces operating expense, maximizes employee productivity, and generates new sources of revenue. However, many I&O teams lack proper
More informationR&S IP-GATE IP gateway for R&S MKS9680 encryption devices
Secure Communications Product Brochure 0.00 R&S IP-GATE IP gateway for encryption devices R&S IP-GATE At a glance The R&S IP-GATE is an IP interface for the encryption device. Used with the, the R&S IP-GATE
More informationSmart Ingest Solution for Telecommunications
Smart Ingest Solution for Telecommunications White Paper Author: Ben Woo Neuralytix, Inc. Doc#: 194292 Published: 2/24/2014 Last Update: 2014 Neuralytix, Inc. and/or its affiliates. All rights reserved
More informationUNIFIED PERFORMANCE MANAGEMENT
UNIFIED PERFORMANCE MANAGEMENT VISIBILITY CONTROL OPTIMIZATION COMPLETE WAN OPTIMIZATION Increase the speed and efficiency of your wide area network. Exinda s Unified Performance Management (UPM) solution
More informationBusiness aware traffic steering
Nokia Networks Business aware traffic steering Nokia Networks white paper Business aware traffic steering Contents 1. Executive Summary 3 2. Static load or QoS-based traffic steering alone is no longer
More informationAmdocs Smart Net Solution
Amdocs Smart Net Solution With the explosive growth of mobile data and the popularity of Wi-Fi as an access technology, Wi-Fi services have become a key strategy for service providers to alleviate network
More informationThe Next Generation Network:
JULY, 2012 The Next Generation Network: Why the Distributed Enterprise Should Consider Multi-circuit WAN VPN Solutions versus Traditional MPLS Tolt Solutions Network Services 125 Technology Drive Suite
More informationMITEL. NetSolutions. Flat Rate MPLS VPN
MITEL NetSolutions Flat Rate MPLS VPN A Comprehensive, Intelligent Network-based Solution Businesses today demand an ever-evolving list of requirements of their networks. From connecting branch locations
More informationINCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
More informationWi-Fi Calling (and Texting) For Mobile Operators
Wi-Fi Calling (and Texting) For Mobile Operators How Operators Can Leverage Existing Wi-Fi Networks to Solve Voice Coverage Challenges within the Home Kineto Wireless, Inc. Worldwide Headquarters 670 N.
More information11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER
11 THINGS YOUR FIREWALL SHOULD DO a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER 2 THE GUIDE OF BY DALE SHULMISTRA Dale Shulmistra is a Technology Strategist at Invenio IT, responsible for
More informationRethinking the Small Cell Business Model
CASE STUDY Intelligent Small Cell Trial Intel Architecture Rethinking the Small Cell Business Model In 2011 mobile data traffic experienced a 2.3 fold increase, reaching over 597 petabytes per month. 1
More informationSolution Brief. Secure and Assured Networking for Financial Services
Solution Brief Secure and Assured Networking for Financial Services Financial Services Solutions Page Introduction To increase competitiveness, financial institutions rely heavily on their networks to
More informationPutting Operators at the Centre of
Putting Operators at the Centre of Enterprise Mobile Security Introduction Small and Medium Enterprises make up the majority of firms and employees in all major economies, yet are largely unidentified
More informationTraffic Analysis With Netflow. The Key to Network Visibility
Summary Today, Enterprises know that the WAN is one of their most important assets. It needs to be up and running 24x7 for the enterprise to function smoothly. To make this possible, IT administrators
More informationSaisei and Intel Maximizing WAN Bandwidth
Intel Network Builders Saisei Solution Brief Intel Xeon Processors Saisei and Intel Maximizing WAN Bandwidth Introduction Despite the increased capacity available on WAN links1, service providers and enterprises
More informationTraffic Analysis with Netflow The Key to Network Visibility
Traffic Analysis with Netflow The Key to Network Visibility > WHITEPAPER Executive Summary Enterprises today, know that the WAN is one of their most important assets. It needs to be up and running 24x7
More informationPer-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
More informationNokia Networks. Nokia Service Quality Manager
Nokia Networks Nokia Service Quality Manager Focus operations on what matters most Enabling mobile broadband growth In today s competitive markets, one challenge is to get a subscriber to sign up; another
More informationService assurance for communications service providers White paper. Improve service quality and enhance the customer experience.
Service assurance for communications service providers White paper Improve service quality and enhance the customer experience. December 2007 2 Contents 2 Overview 2 Move to a competitive business model
More informationSecuring the Intelligent Network
WHITE PAPER Securing the Intelligent Network Securing the Intelligent Network New Threats Demand New Strategies The network is the door to your organization for both legitimate users and would-be attackers.
More informationApplication Visibility and Monitoring >
White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information
More informationCloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds
- The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds February 2011 1 Introduction Today's business environment requires organizations
More informationWhite Paper. 5 Tips to Prepare Your Network for the 2015 Masters
5 Tips to Prepare Your Network for the 2015 Masters Executive Summary The Masters is one of the world s most widely viewed sporting events, and during the 2014 tournament, more than 11 million viewers
More informationExtending Network Visibility by Leveraging NetFlow and sflow Technologies
Extending Network Visibility by Leveraging and sflow Technologies This paper shows how a network analyzer that can leverage and sflow technologies can provide extended visibility into enterprise networks
More informationVoice Over IP Performance Assurance
Voice Over IP Performance Assurance Transforming the WAN into a voice-friendly using Exinda WAN OP 2.0 Integrated Performance Assurance Platform Document version 2.0 Voice over IP Performance Assurance
More informationCreate Extraordinary Online Consumer Experiences. Your Journey Begins with Nominum
Create Extraordinary Online Consumer Experiences Your Journey Begins with Nominum What does it mean to do business with the world s DNS innovation leader? Your Internet services are built on bedrock. Nominum.
More informationDelivering Network Performance and Capacity. The most important thing we build is trust
Delivering Network Performance and Capacity The most important thing we build is trust The Ultimate in Real-life Network Perfomance Testing 1 The TM500 Family the most comprehensive 3GPP performance and
More informationWhite Paper Closing the Mobile Data Revenue Gap
White Paper Closing the Mobile Data Revenue Gap Copyright Openet Telecom, 2009 Copyright OPENET Telecom, 2010 2 Closing the Mobile Data Revenue Gap The demand for mobile data is exploding, presenting operators
More informationwww.samsungnetworks.com Most Innovative LTE Commercial Launch Best Solution for Spectrum Optimization Cell Site Innovation
Most Innovative LTE Commercial Launch Best Solution for Spectrum Optimization Most Innovative Application/Service Outstanding Overall Technology CTO s Choice Best VoLTE Innovation Wide Area Network - Core
More informationHOLDING ON TO YOUR BANDWIDTH
HOLDING ON TO YOUR BANDWIDTH USING APPLICATION CONTROL TO PRIORITIZE YOUR ORGANIZATION'S WIRELESS USAGE Perry Correll, Xirrus, Principal Technologist 1 WI-FI USAGE HAS EVOLVED 2 WI-FI - NO, IT S NOT ALL
More informationTHE VIRTUAL PROBE: ASSURANCE & MONITORING IN THE NFV/SDN ERA
THE VIRTUAL PROBE: ASSURANCE & MONITORING IN THE NFV/SDN ERA White paper December 2015 2 Amdocs service assurance and customer experience monitoring solution is designed for operators who are migrating
More informationJuniper Networks Universal Edge: Scaling for the New Network
Juniper Networks Universal Edge: Scaling for the New Network Executive Summary End-user demand for anywhere and anytime access to rich media content is dramatically increasing pressure on service provider
More informationHow QoS differentiation enhances the OTT video streaming experience. Netflix over a QoS enabled
NSN White paper Netflix over a QoS enabled LTE network February 2013 How QoS differentiation enhances the OTT video streaming experience Netflix over a QoS enabled LTE network 2013 Nokia Solutions and
More informationHow To Manage A Network With Ccomtechnique
SOLUTION BRIEF CA Technologies Application-driven Network Performance Management How do you gain the network-level visibility you need to optimize the performance of your mission-critical applications?
More informationJune 2012. Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com
The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise Regional Findings Americas (Latin and South America, Canada, U.S.A.) Europe, Africa, Middle East Asia
More informationLethal Cocktail: Traffic Off-Loading and Shaping Don t Mix Well
White Paper Lethal Cocktail: Traffic Off-Loading and Shaping Don t Mix Well By: Manish Singh, CTO Overview The introduction of flat rate all-you-can-eat data plans was, if not the most important, a very
More informationGaining Customer Insight through Big Data Analytics
inform innovate accelerate optimize Gaining Customer Insight through Big Data Analytics Rob Rich MD TM Forum Insights rrich@tmforum.org January 29, 2014 2013 TM Forum 1 Agenda Most promising areas for
More informationTHE CONVERGENCE OF NETWORK PERFORMANCE MONITORING AND APPLICATION PERFORMANCE MANAGEMENT
WHITE PAPER: CONVERGED NPM/APM THE CONVERGENCE OF NETWORK PERFORMANCE MONITORING AND APPLICATION PERFORMANCE MANAGEMENT Today, enterprises rely heavily on applications for nearly all business-critical
More informationCreating Business-Class VoIP: Ensuring End-to-End Service Quality and Performance in a Multi-Vendor Environment. A Stratecast Whitepaper
: Ensuring End-to-End Service Quality and Performance in a Multi-Vendor Environment A Executive Summary Creating Business-Class VoIP Traditional voice services have always been reliable, available, and
More informationWIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED
WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED RAJESH KUMAR SUNDARARAJAN Assistant Vice President - Product Management, Aricent Group WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED This whitepaper
More informationApplication Performance Management for Enterprise WANs
Whitepaper Application Performance Management for Enterprise WANs A 3 makes a significant difference to my ability to see what is actually going on and to align my available resource to the most critical
More informationNetwork Instruments white paper
Network Instruments white paper EXTENDING NETWORK VISIBILITY BY LEVERAGING NETFLOW AND SFLOW TECHNOLOGIES This paper shows how a network analyzer that can leverage and sflow technologies can provide extended
More informationR&S IP-GATE IP gateway for ISDN encryption devices
Secure Communications Product Brochure 0.00 R&S IP-GATE IP gateway for ISDN encryption devices R&S IP-GATE At a glance The R&S IP-GATE is an IP interface for the most recent models of the R&S MKS9680 and
More informationNext-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
More informationContinuous Research Service. NFV for Carrier WiFi Brings in a Managed WiFi Service Revolution May 19, 2014
Continuous Research Service NFV for Carrier WiFi Brings in a Managed WiFi Service Revolution May 19, 2014 The concept of virtualizing network services decouples applications from the underlying network
More information10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]
[ WhitePaper ] 10 10 METRICS TO MONITOR IN THE LTE NETWORK. Abstract: The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert service-impacting
More informationHow To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)
1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
More informationDelivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
More informationWhitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com
10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the
More informationWhite Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
More informationSupporting Municipal Business Models with Cisco Outdoor Wireless Solutions
Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions EXECUTIVE SUMMARY Outdoor wireless networks are playing a vital role in helping municipalities deliver critical services to citizens.
More informationRemote Network Monitoring Software for Managed Services Providers
http://www.packettrap.com Remote Network Monitoring Software for Managed Services Providers PacketTrap MSP provides a cost-effective way for you to offer enterprise-class server, application, and network
More informationThe Cloud A Seamless Mobile Experience. Martin Guilfoyle VP Innovation, R&D
The Cloud A Seamless Mobile Experience Martin Guilfoyle VP Innovation, R&D Agenda The Cloud What Is It? Drivers for Cloud services Challenges to The Cloud Introducing ASPX Application store conundrum 2
More informationConsistent Performance on Access Devices. April 2012 WHITE PAPER
April 2012 Executive Summary Service providers that used to offer enterprises and SMBs basic communication services around voice and data are now facing an increasing demand for more advanced services.
More informationNetwork Analytics for More Intelligent SDN
Network Analytics for More Intelligent SDN Derek Granath Sr. Director, Product Line Management Santa Clara, CA USA April 2015 Agenda The Network as a Strategic Business Asset Network Analytics Information
More informationFirewall Testing Methodology W H I T E P A P E R
Firewall ing W H I T E P A P E R Introduction With the deployment of application-aware firewalls, UTMs, and DPI engines, the network is becoming more intelligent at the application level With this awareness
More informationVideo Analytics. Keep video customers on board
Video Analytics Release 1.0 Address the root causes of poor QoE by gaining an in-depth understanding of the customer experience Reduce churn and strengthen customer relationships with analytics that anticipate
More informationRevenue Enhancement and Churn Prevention
Revenue Enhancement and Churn Prevention for Telecom Service Providers A Telecom Event Analytics Framework to Enhance Customer Experience and Identify New Revenue Streams www.wipro.com Anindito De Senior
More informationService Assurance Tools
Managing MPLS with Service Assurance Tools Whitepaper Prepared by www.infosim.net August 2006 Abstract MPLS provides the foundation for the offering of next-generation services and applications such as
More informationCisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services
Cisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services What You Will Learn In today s economy, IT departments are challenged to decide
More informationNetwork Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
More informationCES 9.1 Unleash the Power of Experience
CES 9.1 Unleash the Power of Experience Making the complex SIMPLE > Social, Immediate, Multiple Choice, Personalized Lifestyle Experience Today, communication is not just about the network technology,
More informationUsing & Offering Wholesale Ethernet Network and Operational Considerations
White Paper Using and Offering Wholesale Ethernet Using & Offering Wholesale Ethernet Network and Operational Considerations Introduction Business services customers are continuing to migrate to Carrier
More informationWeb Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
More informationNetwork Management, Performance Characteristics, and Commercial Terms Policy. (1) mispot's Terms of Service (TOS), viewable at mispot.net.
Network Management, Performance Characteristics, and Commercial Terms Policy Consistent with FCC regulations 1, Agri-Valley Broadband, Inc., d/b/a mispot (mispot) provides this information about our broadband
More informationFour Methods to Monetize Service Assurance Monitoring Data
whitepaper Four Methods to Monetize Service Assurance Monitoring Data Using Service Assurance Analytics in Voice and Data Network Monitoring to Increase Revenue and Reduce Cost Introduction In general,
More informationHow Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail
How Fail Today s Networks And Why Will Prevail Why your current firewall may be jeopardizing your security, and how you can counter today s threats, manage web 2.0 apps and enforce acceptable-use policies.
More informationThe Evolution to Local Content Delivery
The Evolution to Local Content Delivery Content caching brings many benefits as operators work out how to cope with the astounding growth in demand for Internet video and other OTT content driven by Broadband
More informationBYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased
More informationAutomation of Smartphone Traffic Generation in a Virtualized Environment. Tanya Jha Rashmi Shetty
Automation of Smartphone Traffic Generation in a Virtualized Environment Tanya Jha Rashmi Shetty Abstract Scalable and comprehensive analysis of rapidly evolving mobile device application traffic is extremely
More information